Skip to main content

Table 1 Characterization of attacks against the normal functioning of CR networks

From: A survey on security attacks and countermeasures with primary user detection in cognitive radio networks

Motivations

Attack goals

Attack approaches

Attack effects

Greedy/selfish

Maximize the communication performance of the attacker.

Make the SUs believe that vacant portions of the spectrum are busy (i.e., induce false alarms) and access them exclusively.

A global decrease on spectrum sharing efficiency and usage fairness.

Malicious

Disrupt the performance and operations of the SUs and/or PUs.

Make the other SUs believe that vacant portions of the spectrum are busy.

A decrease in spectrum usage efficiency and, therefore, in the performance of the affected SUs.

Make the SUs believe that busy portions of the spectrum are idle (missed detections).

A decrease in the protection of the affected PUs against interferences caused by (erroneous) SU transmissions.